4,857 research outputs found
The Imperial Discourse and Roger’s Tragic Death in “Aloewood Incense: Second Burning”
Some scholars hold that Roger’s death in “Aloewood Incense: Second Burning” (1943) was caused by the repulsion from his colleagues and students, this paper, however, maintains that the imperial discourse regarding sexuality and the grand design of colonialism deprived Roger of a sense of belonging in Hong Kong and marginalised him, leaving him with nothing but alienation within the diasporic community and no choice but death. Chang’s exposure of the devastating effect of imperial discourse on its expatriates denounced the superiority of the western culture, indicating her sharp vision as an intellectual
Ethnicity and the Subjectivity of Malaysian-Chinese Diasporic Writers
Diasporic writers are blessed with two cultures. Their choice of which culture to identify with may be promoted by social circumstances. During the 1970s and the 1980s when Malaysia prioritized the Malays and the Chinese were marginalized and reduced to an inferior position in the country, Malaysian-Chinese writers turned traditional Chinese culture into cultural capital to bring comfort and consolation for their community. Besides, they wrote to protest the country’s unfair treatment of the Chinese, lamented the aphasiac state of their fellowmen and defied the nation’s actualizing attempts to stifle the ethnicity of the Chinese. The Malaysian-Chinese writers’ choice of ethnic identity indicated that they were not passive targets to consent the power of the dominant discourse; and it highlighted their subjectivity as diasporic writers
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
Cryptanalysis is an important branch in the study of cryptography, including
both the classical cryptography and the quantum one. In this paper we analyze
the security of two three-party quantum key distribution protocols (QKDPs)
proposed recently, and point out that they are susceptible to a simple and
effective attack, i.e. the dense-coding attack. It is shown that the
eavesdropper Eve can totally obtain the session key by sending entangled qubits
as the fake signal to Alice and performing collective measurements after
Alice's encoding. The attack process is just like a dense-coding communication
between Eve and Alice, where a special measurement basis is employed.
Furthermore, this attack does not introduce any errors to the transmitted
information and consequently will not be discovered by Alice and Bob. The
attack strategy is described in detail and a proof for its correctness is
given. At last, the root of this insecurity and a possible way to improve these
protocols are discussed.Comment: 6 pages, 3 figure
Kinetic study of goethite dehydration and the effect of aluminium substitution on the dehydrate
Goethite and Al-substituted goethite were synthesized and were characterized using XRD and XRF. The kinetic study of goethite dehydrate was investigated by TG and DTG at different heating rates (2, 5, 10, 15, 20 â—¦C/min) and the effect of Al substitution for Fe on dehydrate was studied. The results showed that two types of absorbed water with the same Ed values of 3.4, 6.2 kJ/mol were confirmed on goethite and Alsubstituted goethite. Three types of hydroxyl units were proved, one being on the surface and the other two being in the structure of goethite. The substitution of Al for Fe in the structure of goethite decreases the desorption rate of hydroxyl, increases the dehydroxylation temperature, broadens the desorption peaks in DTG curves, and improves the Ed values from 19.4, 20.4, 26.1 kJ/mol to 21.6, 30, 33.6 kJ/mol when Al substitution comes to 9.1%
- …